نتایج جستجو برای: strand protocol
تعداد نتایج: 284992 فیلتر نتایج به سال:
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol Π1, when analyzed alone, was shown to meet some security goals, will it still meet those goals when executed together with a second protocol Π2? Not necessarily: for every Π1, some Π2s undermine its goals. We use the strand space “authentication test” principles to suggest a criter...
In this application note, we present modifications that should be considered when processing FFPE RNA using Agilent’s SureSelect strand specific RNA library preparation kit for targeted RNA-seq. These guidelines were used to process two very low-quality FFPE RNA samples in parallel with matched snap-frozen controls using a custom SureSelect capture < 3 Mb in size. Our data shows that with a few...
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from a trust management logic with the transmit and receive actions of the protocol principals. The formula on a transmission is a guarantee; the sender must ensure that this formula is true before sending the message. Th...
Formal analysis of security protocols is largely based on a set of assumptions commonly referred to as the Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here: strand spaces [6] and multiset rewriting with existential quantification [2, 5]. Although it is fairly intuitive that these two languages should be equivalent in some way, a number of modificat...
We describe a photochemical procedure for the sterilization of polynucleotides that are created by the Polymerase Chain Reaction (PCR). The procedure is based upon the blockage of Taq DNA polymerase when it encounters a photochemically modified base in a polynucleotide strand. We have discovered reagents that can be added to a PCR reaction mixture prior to amplification and tolerate the thermal...
background: recently different studies suggested that discontinuation of gonadotrophin releasing hormone analogue (gnrha) at beginning of ovarian stimulation (improvement of ovarian response to gonadotrophins) may have some benefit to poor responder patients in invitro fertilization (ivf) cycles. objective:the efficacy of gnrha stop protocol in poor responder patients in ivf cycles was assessed...
objective: this study was conducted to compare the results of fixed versus flexible gnrh antagonist protocols in controlled ovarian stimulation for intra cytoplasmic sperm injection (icsi) in patients with pcos. materials and methods: a randomized clinical trial was performed on 100 pcos women, who were admitted to a tertiary infertility clinic and were candidate for ivf/icsi. they were divided...
Formal analysis of security protocols is largely based on a set of assumptions commonly referred to as the Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here: strand spaces [6] and multiset rewriting with existential quantification [2, 5]. Although it is fairly intuitive that these two languages should be equivalent in some way, a number of modificat...
The human genomic H-ras proto-oncogene was inserted into an Epstein-Barr virus (EBV) vector (p220.2) that replicates synchronously with the cell cycle. Unique restriction enzyme sites, 30 bp apart, were created on either side of codon 12 to enable the construction of gapped heteroduplex (GHD) DNA. Depending upon experimental protocol, the gap could be located either on the coding (non-transcrib...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید